Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D512 TASK 3 CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Beoordeling
-
Verkocht
-
Pagina's
20
Cijfer
A+
Geüpload op
30-03-2026
Geschreven in
2025/2026

WGU D512 TASK 3 CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Instelling
WGU D512
Vak
WGU D512

Voorbeeld van de inhoud

WGU D512 TASK 3 CERTIFICATION SCRIPT
2026 QUESTIONS WITH SOLUTIONS
GRADED A+

◍ Magnum.
Answer: OpenStack module that is an umbrella project that provides
containerization assistance. This module is still in development.
◍ OpenFlow.
Answer: Defined by the ONF, is a protocol between the control and
forwarding layers of an SDN architecture, and is by far the most widespread
implementation of SDN.
◍ Routing Control Platform (RCP).
Answer: Proposed in for the provisioning of inter-domain routing over a
BGP network. Routing is done as a separate entity. Control from physically
distributed entities in a domain is logically centralized in a control plane.
◍ Installation.
Answer: The attacker may install malware on the victim.
◍ Proactive security.
Answer: Refers to a new paradigm of security management, where instead
of defending the network infrastructure by detecting, preventing, tracking
and remediation of threats, attack surface is changed over time.
◍ Network Functions Virtualization Infrastructure (NFVI).
Answer: Is the entirety of the hardware and software components that build
the environment where VNFs are deployed.
◍ Murano.
Answer: OpenStack module that provides a white list repository of

, applications.
◍ Risk.
Answer: The quantifiable likelihood of loss due to a realized threat, and it
emphasizes the quantitative of potential damages.
◍ Application Level MTD.
Answer: Involves a change in the application required, source code, memory
mapping, and software version.
◍ MTD - Redundancy.
Answer: Creates multiple replicas of a network component in order to
maintain an optimal level of service in case of network attacks like DDoS
attacks. Another benefit is that we can create decoys in the network for
increasing the discovery time of the actual target.
◍ Open Platform for NFV (OPNFV).
Answer: Created by the Linux Foundation in 2014 and is a collaborative
open-source platform that seeks to develop NFV and shape its evolution.
◍ NFV Management and Orchestration (NFV-MANO).
Answer: Consists of all functional blocks, data repositories, reference points,
and interfaces that are used for managing and orchestrating VNFs and the
NFVI.
◍ Clustering.
Answer: Adds a layer of defense against the controller being a single point
of failure by having one or more controllers in an active / standby scenario.
◍ RouteFlow.
Answer: Project initially named as QuagFlow, which aimed to provide IP
routing as Router-as-a-Service in a virtualized environment. Considered the
basic architecture to control routing in SDNs.
◍ OpenStack.
Answer: An open-source cloud computing platform that has high market
penetration that includes a collection of interoperable modules that are used

, to orchestrate large pools of compute, storage, and networking resources.
◍ Two most common forms of NVs.
Answer: Protocol-based virtual networksVirtual networks that are based on
virtual devices
◍ Ironic.
Answer: OpenStack module that is a provisioning tool for baremetal
installation of compute capabilities instead of VMs in OpenStack.
◍ Application layer.
Answer: Contains the typical network applications or functions
organizations use and talk to control layer via NBI
◍ L2TP (Layer 2 Tunneling Protocol).
Answer: a tunneling protocol used to support VPNs or as part of the delivery
of services by ISPs. It does not provide any encryption or confidentiality by
itself. Rather, it relies on an encryption protocol that it passes within the
tunnel to provide privacy.
◍ Vulnerability.
Answer: A weakness or gap in a security system that can be either exploited
by attackers or caused by malfunctioning system components.
◍ POSTROUTING.
Answer: After all other routing rules have been applied, the NAT chain that
will determine where it goes based on where it came from (source).
◍ Exploitation.
Answer: This implies actual detonation of the attack, such as the exploit
running on the system.
◍ Intrusion Prevention System (IPS).
Answer: a network security / threat prevention technology that examines
network traffic flows to detect and prevent vulner ability exploits.
◍ UDP port number 68.
Answer: Destination port of a DHCP client

Geschreven voor

Instelling
WGU D512
Vak
WGU D512

Documentinformatie

Geüpload op
30 maart 2026
Aantal pagina's
20
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,55
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
ProfessorBeatrice

Maak kennis met de verkoper

Seller avatar
ProfessorBeatrice Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
2 weken
Aantal volgers
0
Documenten
2260
Laatst verkocht
1 dag geleden
Professor_Beatrice7

I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top notch, easy to digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, I have you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner. Think of this place as a place where productivity meets peace of mind. So settle in and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making me your study partner. Let’s unlock your full potential together!

Lees meer Lees minder
0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen